Showing 801 - 820 results of 6,037 for search 'main algorithm', query time: 0.15s Refine Results
  1. 801

    Research on Audit Risk Prediction in Enterprise Management Based on Optimized BP Neural Network Algorithm by Wang Mingming

    Published 2025-01-01
    “…After understanding the current research status of enterprise management audit risk prediction, this paper mainly discusses the risk assessment model of audit material misstatement based on the optimized B neural network algorithm based on the BP neural network algorithm and the basic concepts of enterprise audit work, and conducts verification and analysis based on practical cases, and finally proves that the prediction results of the model are effective and scientific, which is worthy of application in enterprise management.…”
    Get full text
    Article
  2. 802

    Homogeneity Test of Many-to-One Risk Differences for Correlated Binary Data under Optimal Algorithms by Keyi Mou, Zhiming Li

    Published 2021-01-01
    “…In clinical studies, it is important to investigate the effectiveness of different therapeutic designs, especially, multiple treatment groups to one control group. The paper mainly studies homogeneity test of many-to-one risk differences from correlated binary data under optimal algorithms. …”
    Get full text
    Article
  3. 803

    Distributed Algorithm for Traffic Data Collection and Data Quality Analysis Based on Wireless Sensor Networks by Nan Ding, Guozhen Tan, Wei Zhang, Hongwei Ge

    Published 2011-09-01
    “…The growing need of the real-time traffic data has spurred the deployment of large-scale dedicated monitoring infrastructure systems, which mainly consist of the use of inductive loop detectors. …”
    Get full text
    Article
  4. 804

    Discrete multi-objective optimization of particle swarm optimizer algorithm for multi-agents collaborative planning by Xiao-bo SHI, Yin ZHANG, Shan ZHAO, Deng-ming XIAO

    Published 2016-06-01
    “…Although multiple mobile agents(MA)collaboration can quickly and efficiently complete data aggregation in wireless sensor network,the MA carrying data packages extensively increase along with a raise in the number of data source nodes accessed by MA,which causes unbalanced energy load of sensor nodes,high energy consumption of partial source nodes,and shortened lifetime of networks.The existing related works mainly focus on the objective of decreasing total energy consumption of multiple MA,without considering that rapidly energy consumption of partial source nodes has a negative effect on networks lifetime.Therefore,discrete multi-objective optimization of particle swarm algorithm was proposed,which used the total network energy consumption and mobile agent load balancing as fitness function for the approximate optimal itinerary plan in multiple mobile agent collaboration.Furthermore,the simulation result of the proposed algorithm is better than the similar algorithm in total energy consumption and network lifetime.…”
    Get full text
    Article
  5. 805

    Fast Decomposition Algorithm Based on Two-Dimensional Wavelet Transform for Image Processing of Graphic Design by Feifei Jiang, Wenting Yao

    Published 2021-01-01
    “…In this paper, we propose a fast decomposition algorithm image processing method based on a new transform of the wavelet transform, which mainly addresses the problems of large computation of feature points and long-time consumption of traditional image processing algorithms. …”
    Get full text
    Article
  6. 806

    Adaptive Full-Duplex and Half-Duplex Power Line Relay and Power Optimization Allocation Algorithm by Zhixiong CHEN, Honghai ZENG, Dongsheng HAN

    Published 2021-06-01
    “…In order to improve the long-distance communication capability, power line communication currently mainly adopts a two-slot half-duplex relay technology. …”
    Get full text
    Article
  7. 807

    Relay selection algorithm based on selfish behavior analysis in ultra-dense D2D by Yijun WANG, Youxu ZHANG, Dakun LIU, Guifen CHEN

    Published 2021-04-01
    “…In ultra-dense D2D communication, the current relay selection schemes mainly assume that the relay device has the initiative to participate in data forwarding, but some rational relay devices may delay or refuse to forward due to their own considerations, thus affecting the user experience.From the perspective of selfish behavior of relay devices, a method to identify selfish relay devices in D2D communication was proposed, and then an ultra-dense D2D relay selection algorithm based on selfish behavior analysis was proposed.Firstly, three relay identification attribute factors, namely joint interest degree (JID), forwarding history ratio (FHR) and relay physical state (RPS) were defined, and their weights were calculated by triangular fuzzy function to identify relay devices with selfish behavior.Secondly, based on the TOPSIS (technique for order of preference by similarity to ideal solution) method, the final relay equipment selection scheme relay was realized.Simulation results show that the proposed algorithm can identify selfish relay devices more effectively in D2D communication.Compared with other relay selection algorithms, the proposed algorithm has made significant progress in the aspects of D2D communication forwarding success rate, system average throughput and average time delay.…”
    Get full text
    Article
  8. 808

    BHT-QAOA: The Generalization of Quantum Approximate Optimization Algorithm to Solve Arbitrary Boolean Problems as Hamiltonians by Ali Al-Bayaty, Marek Perkowski

    Published 2024-10-01
    “…A new methodology is introduced to solve classical Boolean problems as Hamiltonians, using the quantum approximate optimization algorithm (QAOA). This methodology is termed the “Boolean-Hamiltonians Transform for QAOA” (BHT-QAOA). …”
    Get full text
    Article
  9. 809

    An adaptive differential evolution algorithm using fitness distance correlation and neighbourhood-based mutation strategy by Wei Li, Yafeng Sun, Ying Huang, Jianbing Yi

    Published 2022-12-01
    “…However, the DE algorithm mainly focuses on strengthening the adaptability of exploitation, which allows the sensitivity of the DE algorithm to be solved in cases where the effects of solving various types of problems are quite different. …”
    Get full text
    Article
  10. 810

    Relay selection algorithm based on selfish behavior analysis in ultra-dense D2D by Yijun WANG, Youxu ZHANG, Dakun LIU, Guifen CHEN

    Published 2021-04-01
    “…In ultra-dense D2D communication, the current relay selection schemes mainly assume that the relay device has the initiative to participate in data forwarding, but some rational relay devices may delay or refuse to forward due to their own considerations, thus affecting the user experience.From the perspective of selfish behavior of relay devices, a method to identify selfish relay devices in D2D communication was proposed, and then an ultra-dense D2D relay selection algorithm based on selfish behavior analysis was proposed.Firstly, three relay identification attribute factors, namely joint interest degree (JID), forwarding history ratio (FHR) and relay physical state (RPS) were defined, and their weights were calculated by triangular fuzzy function to identify relay devices with selfish behavior.Secondly, based on the TOPSIS (technique for order of preference by similarity to ideal solution) method, the final relay equipment selection scheme relay was realized.Simulation results show that the proposed algorithm can identify selfish relay devices more effectively in D2D communication.Compared with other relay selection algorithms, the proposed algorithm has made significant progress in the aspects of D2D communication forwarding success rate, system average throughput and average time delay.…”
    Get full text
    Article
  11. 811

    Optimization of Lattice-Based Cryptographic Key Generation using Genetic Algorithms for Post-Quantum Security by Tara Nawzad Ahmad Al Attar, Rebaz Nawzad Mohammed

    Published 2025-04-01
    “…However, practically implementing LBC is faced with key-generation and optimization difficulties, mainly because of its enormous key sizes and computational overhead. …”
    Get full text
    Article
  12. 812

    Augmented Reality for Learning Algorithms: Evaluation of Its Impact on Students’ Emotions Using Artificial Intelligence by Mónica Gómez-Ríos, Maximiliano Paredes-Velasco, J. Ángel Velázquez-Iturbide, Miguel Ángel Quiroz Martínez

    Published 2025-07-01
    “…Augmented reality is an educational technology mainly used in disciplines with a strong physical component, such as architecture or engineering. …”
    Get full text
    Article
  13. 813

    A Comparative Analysis of Machine Learning Algorithms for Classification of Diabetes Utilizing Confusion Matrix Analysis by Maad M. Mijwil, Mohammad Aljanabi

    Published 2024-05-01
    “…The study determined that three algorithms are very effective at prediction. Mainly, logistic regression and Adaboost had a classification rate above 92%, and the naive bayes algorithm achieved a classification rate above 90%. …”
    Get full text
    Article
  14. 814

    Intra-Net Cognitive Radio Intelligent Utility Maximization using Adaptive PSO-Gradient Algorithm by Imran Ullah Khan

    Published 2020-11-01
    “… Artificial intelligence now days are mainly dependent on deep learning techniques as it is rapidly growing and capable to outperform other approaches and even human at various problems. …”
    Get full text
    Article
  15. 815

    An improved multi-leader comprehensive learning particle swarm optimisation based on gravitational search algorithm by Alfred Adutwum Amponsah, Fei Han, Jeremiah Osei-Kwakye, Ernest Bonah, Qing-Hua Ling

    Published 2021-10-01
    “…Gravitational Search Algorithm is introduced to preserve the algorithm’s ability to maintain diversity. …”
    Get full text
    Article
  16. 816

    A Fast Rail Profile Point Cloud Matching Algorithm Based on Overlay Weight ICP by ZUO Wei, LI Jianfeng, LUO Zihe

    Published 2023-10-01
    “…The factors that affect rail's performance and quality mainly include fractures, abrasion, scratches, wear, etc. …”
    Get full text
    Article
  17. 817

    A New Intrusion Detection System Based on KNN Classification Algorithm in Wireless Sensor Network by Wenchao Li, Ping Yi, Yue Wu, Li Pan, Jianhua Li

    Published 2014-01-01
    “…Internet of Things composed of wireless sensor network faces security threats mainly from Dos attack, replay attack, integrity attack, false routing information attack, and flooding attack. …”
    Get full text
    Article
  18. 818

    Small Target Detection Algorithm for UAV Aerial Images Based on Improved YOLOv7-tiny by ZHANG Guanghua, LI Congfa, LI Gangying, LU Weidang

    Published 2025-05-01
    “…Comparative experiments are also conducted to assess and analyze the detection performance of the improved algorithm against other algorithms.This study mainly addresses the following aspectsConclusionsThis study mainly addresses and improves the issues of missed and false detections caused by large-scale variations, dense small target distributions, and complex backgrounds in UAV aerial images. …”
    Get full text
    Article
  19. 819

    Estimation of the Ultimate Bearing Capacity of the Rocks via Utilization of the AI-Based Frameworks by Bianca Damico, Matteo Conti

    Published 2024-12-01
    “…The approach adopted here is new and solves the problem using KNN combined with two modern nature-inspired optimization frameworks, namely the Honey Badger Algorithm (HBA) and Equilibrium Slime Mould Algorithm (ESMA). …”
    Get full text
    Article
  20. 820